Skip to content

Commit 9df674a

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/memdocs (branch main)
2 parents 2f41cee + b30ee5b commit 9df674a

5 files changed

Lines changed: 8 additions & 5 deletions

File tree

memdocs/intune/apps/app-configuration-policies-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ You can validate the app configuration policy using the following three methods:
143143
You can validate iOS/iPadOS configuration with the **Intune Diagnostic Log** for settings deployed through the managed app configuration policies. In addition to the below steps, you can access managed app logs using Microsoft Edge. For more information, see [Use Edge for iOS and Android to access managed app logs](manage-microsoft-edge.md#use-edge-for-ios-and-android-to-access-managed-app-logs).
144144

145145
1. If not already installed on the device, download and install the **Microsoft Edge** from the App Store. For more information, see [Microsoft Intune protected apps](apps-supported-intune-apps.md).
146-
2. Launch the **Microsoft Edge** and select **about** > **intunehelp** from the navigation bar.
146+
2. Launch the **Microsoft Edge** and enter **about:intunehelp** in the address box.
147147
3. Click **Get Started**.
148148
4. Click **Share Logs**.
149149
5. Use the mail app of your choice to send the log to yourself so they can be viewed on your PC.
@@ -187,7 +187,7 @@ Your application configuration details should match the application configuratio
187187
You can validate iOS/iPadOS configuration with the **Intune Diagnostic Log** on managed devices for managed app configuration.
188188

189189
1. If not already installed on the device, download and install the **Microsoft Edge** from the App Store. For more information, see [Microsoft Intune protected apps](apps-supported-intune-apps.md).
190-
2. Launch **Microsoft Edge** and select **about** > **intunehelp** from the navigation bar.
190+
2. Launch **Microsoft Edge** and enter **about:intunehelp** in the address box.
191191
3. Click **Get Started**.
192192
4. Click **Share Logs**.
193193
5. Use the mail app of your choice to send the log to yourself so they can be viewed on your PC.

memdocs/intune/apps/app-discovered-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following list provides the app platform type, the apps that are monitored f
6565
| iOS/iPadOS | Only managed apps | All apps installed on the device | Every 7 days from device enrollment |
6666
| macOS | Only managed apps | All apps installed on the device | Every 7 days from device enrollment |
6767
| Android | Only managed apps | All apps installed on the device | Every 7 days from device enrollment |
68-
| Android Enterprise | Only managed apps | Only apps installed in the Android Enterprise fully managed work profile | Every 7 days from device enrollment |
68+
| Android Enterprise | Only managed apps | Only apps installed on the Android Enterprise work profile device | Every 7 days from device enrollment |
6969

7070
> [!NOTE]
7171
> - Windows 10/11 co-managed devices, as shown in the [client apps](../../configmgr/comanage/workloads.md#client-apps) workload in Configuration Manager, do not currently collect app inventory through the Intune Management Extension (IME) as per the above schedule. To mitigate this issue, the [client apps](../../configmgr/comanage/workloads.md#client-apps) workload in Configuration Manager should be switched to Intune for the IME to be installed on the device (IME is required for Win32 inventory and PowerShell deployment). Note that any changes or updates on this behavior are announced in [in development](../fundamentals/in-development.md) and/or [what's new](../fundamentals/whats-new.md).

memdocs/intune/apps/mam-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ sections:
4949
5050
- question: Is it possible to have both MDM and MAM policies applied to the same user at the same time, for different devices? For example, if a user could be able to access their work resources from their own MAM-enabled machine, but also come to work and use an Intune MDM-managed device. Are there any caveats to this idea?
5151
answer: |
52-
If you apply a MAM policy to the user without setting the device state, the user will get the MAM policy on both the BYOD device and the Intune-managed device. You can also apply a MAM policy based on the managed state. So when you create an app protection policy, next to Target to apps on all device types, you'd select No. Then do any of the following:
52+
If you apply a MAM policy to the user without setting the device management state, the user will get the MAM policy on both the BYOD device and the Intune-managed device. You can also apply a MAM policy based on the device management state. So when you create an app protection policy, next to Target to apps on all device types, you'd select No. Then do any of the following:
5353
- Apply a less strict MAM policy to Intune managed devices, and apply a more restrictive MAM policy to non MDM-enrolled devices.
5454
- Apply an equally strict MAM policy to Intune managed devices as to 3rd party managed devices.
5555
- Apply a MAM policy to unenrolled devices only.

memdocs/intune/apps/windows-store-for-business.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,9 @@ The [Microsoft Store for Business](https://www.microsoft.com/business-store) giv
4444

4545
## Before you start
4646

47+
> [!IMPORTANT]
48+
> Microsoft Store for Business will be retired in the first quarter of 2023. However, admins can still leverage the connection to Store for Business and Education from their UEM solution to deploy apps to managed Windows 11 devices until they are retired in 2023.
49+
4750
Review the following information before you start syncing and assigning apps from the Microsoft Store for Business:
4851

4952
- Configure Intune as the mobile device management authority for your organization.

memdocs/intune/protect/quickstart-set-password-length-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Create a device compliance policy to require your workforce's Android users to e
5454

5555
2. For **Platform**, select **Android Enterprise**.
5656

57-
3. For **Policy type**, select either **Fully managed, dedicated, and corporate-owned work profile** or **Personally-owned work profile**, and then click **Create**.
57+
3. For **Profile type**, select either **Fully managed, dedicated, and corporate-owned work profile** or **Personally-owned work profile**, and then click **Create**.
5858

5959
4. On **Basics** step, enter **Android compliance** as the *Name*. Adding a *Description* is optional. Click **Next**.
6060

0 commit comments

Comments
 (0)